Dumpster diving, social engineering, and Internet searches are some of the activities that take place in the following step of the attacker's methodology

a. Reconnaissance
b. Scanning and enumeration
c. Gaining access
d. Escalation of privilege

ANS: A

Computer Science & Information Technology

You might also like to view...

________ enable you to define the parts of an image that are important to display

Fill in the blank(s) with correct word

Computer Science & Information Technology

Third-generation computers used vacuum tubes

Indicate whether the statement is true or false

Computer Science & Information Technology